Changeflow GovPing Data Privacy & Cybersecurity Linux Kernel Vulnerabilities Allow DoS, Code Ex...
Urgent Notice Added Final

Linux Kernel Vulnerabilities Allow DoS, Code Execution

Favicon for wid.cert-bund.de CERT-Bund Security Advisories
Published March 24th, 2026
Detected March 25th, 2026
Email

Summary

CERT-Bund has issued a security advisory regarding multiple critical vulnerabilities in the Linux Kernel, with a CVSS base score of 9.8. These vulnerabilities can allow attackers to cause denial of service, bypass security measures, disclose information, and potentially execute code remotely. Mitigation measures are available.

What changed

CERT-Bund has released advisory WID-SEC-2026-0861 detailing critical vulnerabilities (CVSS 9.8) in the Open Source Linux Kernel. Exploitation could lead to denial of service, information disclosure, security bypass, and remote code execution. The advisory indicates that mitigation measures are available.

Organizations utilizing Linux operating systems should immediately assess their systems for vulnerability and apply available mitigation strategies. Given the critical nature and potential for remote code execution, prompt action is advised to prevent potential security breaches and operational disruptions. The advisory provides links for further information and specific CVE details.

What to do next

  1. Assess Linux systems for identified vulnerabilities
  2. Apply available mitigation measures promptly
  3. Review CERT-Bund advisory for specific CVE details and guidance

Source document (simplified)

[WID-SEC-2026-0861] Linux Kernel: Mehrere Schwachstellen CVSS Base Score 9.8 (kritisch) CVSS Temporal Score 8.5 (hoch) Remoteangriff ja Datum 24.03.2026 Stand 25.03.2026 Mitigation ja

Betroffene Systeme

Betriebssystem

  • Linux

Produktbeschreibung

Der Kernel stellt den Kern des Linux Betriebssystems dar.

Produkte

24.03.2026
- Open Source Linux Kernel

Angriff

Angriff

Ein Angreifer kann mehrere Schwachstellen in Linux Kernel ausnutzen, um einen Denial of Service zu verursachen, Sicherheitsmaßnahmen zu umgehen, Informationen offenzulegen, weitere nicht spezifizierte Auswirkungen zu verursachen und potentiell Code auszuführen. CVE Informationen Versionshistorie Feedback zum Advisory geben

Source

Analysis generated by AI. Source diff and links are from the original.

Classification

Agency
CERT-Bund
Published
March 24th, 2026
Instrument
Notice
Legal weight
Non-binding
Stage
Final
Change scope
Substantive
Document ID
WID-SEC-2026-0861

Who this affects

Applies to
Employers
Industry sector
5112 Software & Technology
Activity scope
Vulnerability Management System Hardening
Geographic scope
Germany DE

Taxonomy

Primary area
Cybersecurity
Operational domain
IT Security
Compliance frameworks
NIST CSF NIST 800-53
Topics
Vulnerability Management Operating Systems

Get Data Privacy & Cybersecurity alerts

Weekly digest. AI-summarized, no noise.

Free. Unsubscribe anytime.

Get alerts for this source

We'll email you when CERT-Bund Security Advisories publishes new changes.

Free. Unsubscribe anytime.